code format
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 6)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Tianshi Li ◽  
Elijah B. Neundorfer ◽  
Yuvraj Agarwal ◽  
Jason I. Hong

In-app privacy notices can help smartphone users make informed privacy decisions. However, they are rarely used in real-world apps, since developers often lack the knowledge, time, and resources to design and implement them well. We present Honeysuckle, a programming tool that helps Android developers build in-app privacy notices using an annotation-based code generation approach facilitated by an IDE plugin, a build system plugin, and a library. We conducted a within-subjects study with 12 Android developers to evaluate Honeysuckle. Each participant was asked to implement privacy notices for two popular open-source apps using the Honeysuckle library as a baseline as well as the annotation-based approach. Our results show that the annotation-based approach helps developers accomplish the task faster with significantly lower cognitive load. Developers preferred the annotation-based approach over the library approach because it was much easier to learn and use and allowed developers to achieve various types of privacy notices using a unified code format, which can enhance code readability and benefit team collaboration.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Nai-Hsin Pan ◽  
Kuei-Yen Chen

The importance of facility management (FM) has gradually been recognized in the life cycle of a building. Both new and existing buildings require a more efficient approach and advanced technology to improve the efficiency of the FM. The study is aimed to enhance the facility repair process. Thus, the study presents a building information modeling (BIM)-based facility repair platform framework, which enables expedited reporting for repairs and a comprehensive listing of the status, location, and maintenance record facilities. To effectively facilitate the FM information transfer among stakeholders, firstly, the study presents a facility traceability coding structure for building facilities, the proposed platform framework. The proposed facility traceability information coding in QR code format can help general users and FM personnel identify and locate the specific or abnormal facility quickly. Secondly, the study demonstrates that how to apply the proposed code in QR code format in the BIM-based facility repair platform with a case test. The research findings showed that the proposed method enables FM personnel to significantly improve the efficiency of FM, which can help FM personnel make preliminary facility repair judgments and schedule maintenance plan to track the status of the facility repair which can help improve the efficiency of facility management and simplify the repair process.


2020 ◽  
Vol 26 ◽  
pp. 144-148
Author(s):  
Jan Voříšek ◽  
Bořek Patzák

In this contribution, we present the concept of a 3D printer software emulator facilitating the creation of a spatial finite element mesh suitable for the printing process simulation. The concept is based on gradual processing of a native 3D printer input file (in a G-code format). This file contains a complete description of manufacturing process consisting of series of individual commands interpreted by a printer. The effect of each command needs to be precisely evaluated to obtain the position of the printer head and the volume of the deposited material in any given time. The calculation is performed in the same way as in the Marlin printer firmware using the trapezoidal motion curves and a command buffer. To represent a computational model, a discrete voxel model with variable edge length and time discretization is used. The volume of deposited material is calculated for each voxel as a function of time. The resulting model is suitable for numerical analysis of the printing process.


Locked Out ◽  
2019 ◽  
pp. 47-72
Author(s):  
Evan Elkins

Chapter 2 explores the history of regional lockout in console video games. As video games became popular throughout Japan and North America in the 1980s, the industry forged a system of carefully managed adaptation and distribution of games to each market. Game companies introduced region chips and differently shaped cartridges to ensure that consumers were using games on approved devices, and they eventually adopted a region code format similar to the DVD. The industry’s longtime use of regional lockout helped set the contours of global distribution, but it also fomented a network of piracy, game and console hacking, and informal trade among consumers who typify the “hardcore” gamer. Knowing how to navigate and circumvent regional lockout became a marker of participation in hardcore gamer communities. Chapter 2 thus argues that regional lockout did more than simply control global video game distribution paths. It also helped shape the contours of hardcore gamer culture.


Author(s):  
Sabrina Leone

Smart learners are lifelong learners whose potential is unleashed by the seamless use of smart technologies (i.e., smartphones, tablets, tablet PCs, sensor network nodes, contact-less smart cards, RFID, and QR codes) to access huge amounts of open resources and connections, anywhere and anytime. Personal, and personalized, smart technologies increase a learner's independence in a novel way, and make the context for engaging in study more tailored and potentially self-directed. This chapter illustrates the QR code format, a framework that supports smart learning by the integration of paper-based and digital learning material through quick response (QR) code. The format was devised within the research project Learning4All (2009-2012) and was validated by several learning experiences of English as a foreign language (EFL) for different clusters. Subsequently, the format was selected as an element of techno-pedagogical innovation in the Eureka project (2012-2014), a network of 11 schools in Apulia, Italy, for the enhancement of curriculum continuity from middle into high school.


2018 ◽  
Vol 2 (1) ◽  
pp. 51
Author(s):  
Francisco Alan De Oliveira Santos

INTRODUCTION: This work reports on the creation and use of a tool to verify compliance in java programming exercises. The solution is based on the hypothesis that computational reflection can provide a way to automatically assess the programing competences of students. The work reflects the concern to make students learning a programming language have practical activities in parallel to what they learn in theoretical classes. OBJECTIVE: Attesting the effectiveness of using computational reflection to automatically correct programming exercises. Provide the teacher with a tool to support the follow-up of practical activities. Provide students with immediate feedback on their learning, so as to encourage them to behave more autonomously. METHOD: A case study was carried out with two classes of a computer sciencecourse. They answered five practical programming exercices and their responses for each activity were collected in source code format, which were used as the basis of solutions, totaling 100 responses.A comparative analysis was made between the notes obtained through CodeTeacher and the notes assigned by a group of  teachers. RESULTS: Comparing the expected notes and the actual notes, the automatic correction obtained an accuracy of 90.17%. CONCLUSION: The use of computational reflection techniques for assisted correction in programming classes can bring beneficial result. Teachers can optimize their work and have performance reports of their students. Students can also be benefited by having an immediate feedback, so they can perceive themselves capable of achieving the learning objectives defined by the teacher.


Author(s):  
Dr. Shikha Sarkar ◽  
Sambuddha Majumder ◽  
Jayanta Majumder
Keyword(s):  

2018 ◽  
Vol 17 ◽  
pp. 117693511877197 ◽  
Author(s):  
Richard Finney ◽  
Daoud Meerzaman

Chromatic is a novel web-browser tool that enables researchers to visually inspect genomic variations identified through next-generation sequencing of cancer data sets to determine whether such calls are, in fact, valid. It is the first cancer bioinformatics tool developed using WebAssembly technology, which comprises a portable, low-level byte code format that provides for the rapid execution of programs within supported web browsers. It has been designed expressly for ease of use by scientists without extensive expertise in bioinformatics.


2013 ◽  
Vol 1 (1) ◽  
pp. 68-87
Author(s):  
Dapeng Liu ◽  
Shaochun Xu ◽  
Huafu Liu

This paper presents a series of two experiments in which programming behaviors were observed and analyzed when they were programming with pressure and without pressure. There were eleven and twenty-four subjects respectively. In both experiments, the authors used a software tool to record the keystroke frequency, designed criteria to evaluation program quality, and conducted a survey after the experiment. The experiment results show that there is no direct relation between the numbers of keystrokes and programmer’s performance when programmers are working without pressure or with pressure. The first experiment results demonstrate while novice programmers are diverse in terms of programming styles, ones with more experiences tend to control code execution in finer granularity. Source code format can be an indicator of programming performance. The second experiment results demonstrate that programmers with higher performance likely have higher keystroke productivity. Programmers are also more productive under pressure in terms of keystrokes.


Sign in / Sign up

Export Citation Format

Share Document